General

  • Target

    75d63e7c1704d5a11414f3ca7bb792a1d1337c61c180ea7437776e3bbf04d4c7

  • Size

    134KB

  • MD5

    f889866ce6caa5e169eff7e0ea86f9b1

  • SHA1

    8c03036ecc1a42b57379c899a6c46c2a8065d39a

  • SHA256

    75d63e7c1704d5a11414f3ca7bb792a1d1337c61c180ea7437776e3bbf04d4c7

  • SHA512

    46292a9d81ba3f5ec733c3fc3b67d68f3c80488b4beb9816e8b2fd00ee58bbddcc8722b160a4b6ddd292e5a44d09e82a20c3f7f1f9ed7639020366685cc8cb04

  • SSDEEP

    3072:HqSAppX6E2GJM4OCwEcg28XSt6U6Jamq0ichYyeaK0TU:Hqd/KmWMXStcJamq0ichYyeaK0TU

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 75d63e7c1704d5a11414f3ca7bb792a1d1337c61c180ea7437776e3bbf04d4c7
    .elf linux x86